header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Koobi v4.4,V5.4 gallery (img_id)

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'img_id' parameter to the '/index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the admin panel.

Koobi Pro 6.25 shop (categ)

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'categ' parameter to 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.

Koobi Pro 6.25 links(categ)

An attacker can exploit a SQL injection vulnerability in Koobi Pro 6.25 by sending a maliciously crafted HTTP request to the vulnerable application. This request contains a specially crafted SQL statement that when executed, will return the email and password of the admin user from the kpro_user table. The attacker can then use this information to gain access to the application.

Prediction Football v 1.x Remote SQL INJECTION

Prediction Football is a program that provides a web based administration config and automated prediction leagues. This program supports multiple languages. This script makes predictions simultaneously. This helps you to message other users and capable of multiple fixture creation. This requires web server with support for PHP4.0 or greater, MySQL database. Very easy to download and install the program and execute. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable server with the following payload: http://target.domain/[path]/showpredictionsformatch.php?sid=dupa&matchid=-666/**/union/**/select/**/1,2,3,concat(0x757365723a,username),concat(0x7061737377643a,password),6,7/**/from/**/pluserdata/**/WHERE/**/userid=1/*, where userid=1 is the admin user.

SuperNET Shop v1.0 Remote SQL Injection Vulnerability

SuperNET Shop v1.0 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects the 'id' parameter of the 'guncelle.asp' script. An attacker can exploit this issue to bypass the authentication process and gain access to the administrative panel. The attacker can supply the username and password fields with the value 'or' to bypass the authentication process.

Pligg Content Management System SQL Injection Vulnerability

Pligg content management system is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. To exploit this, an attacker needs the id of a news they submitted and an id of a news submitted by others. When the LIKE statement matches, the attacker will get a 'Not your link' error.

ExBB <= 0.22 Multiple File Inclusion / Code Execution Vulnerability

ExBB <= 0.22 is vulnerable to multiple file inclusion and code execution due to improper input validation. The vulnerability is caused due to the use of register_globals, allow_url_fopen, and allow_url_include PHP directives. An attacker can exploit this vulnerability by sending malicious requests to the vulnerable server.

Recent Exploits: